Privacy-preserving data mining: methods, metrics, and applications
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …
computing devices. The analysis of such information is fostering businesses and …
A survey of privacy vulnerabilities of mobile device sensors
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
[图书][B] A general survey of privacy-preserving data mining models and algorithms
CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …
the wide proliferation of sensitive information on the internet. A number of algorithmic …
Preserving privacy by de-identifying face images
EM Newton, L Sweeney, B Malin - IEEE transactions on …, 2005 - ieeexplore.ieee.org
In the context of sharing video surveillance data, a significant threat to privacy is face
recognition software, which can automatically identify known people, such as from a …
recognition software, which can automatically identify known people, such as from a …
State-of-the-art in privacy preserving data mining
We provide here an overview of the new and rapidly emerging research area of privacy
preserving data mining. We also propose a classification hierarchy that sets the basis for …
preserving data mining. We also propose a classification hierarchy that sets the basis for …
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
K Liu, H Kargupta, J Ryan - IEEE Transactions on knowledge …, 2005 - ieeexplore.ieee.org
This paper explores the possibility of using multiplicative random projection matrices for
privacy preserving distributed data mining. It specifically considers the problem of computing …
privacy preserving distributed data mining. It specifically considers the problem of computing …
Association rule hiding
Large repositories of data contain sensitive information that must be protected against
unauthorized access. The protection of the confidentiality of this information has been a long …
unauthorized access. The protection of the confidentiality of this information has been a long …
Maintaining data privacy in association rule mining
SJ Rizvi, JR Haritsa - VLDB'02: Proceedings of the 28th International …, 2002 - Elsevier
Publisher Summary Data mining services require accurate input data for their results to be
meaningful, but privacy concerns may influence users to provide spurious information. The …
meaningful, but privacy concerns may influence users to provide spurious information. The …
[PDF][PDF] Privacy preserving frequent itemset mining
SRM Oliveira, OR Zaiane - … of the IEEE ICDM workshop on …, 2002 - webdocs.cs.ualberta.ca
One crucial aspect of privacy preserving frequent itemset mining is the fact that the mining
process deals with a trade-off: privacy and accuracy, which are typically contradictory, and …
process deals with a trade-off: privacy and accuracy, which are typically contradictory, and …
Hiding association rules by using confidence and support
E Dasseni, VS Verykios, AK Elmagarmid… - Information Hiding: 4th …, 2001 - Springer
Large repositories of data contain sensitive information which must be protected against
unauthorized access. Recent advances, in data mining and machine learning algorithms …
unauthorized access. Recent advances, in data mining and machine learning algorithms …